Losing the Cybersecurity War
eBook - ePub

Losing the Cybersecurity War

And What We Can Do to Stop It

  1. 148 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Losing the Cybersecurity War

And What We Can Do to Stop It

Book details
Table of contents
Citations

About This Book

This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We have taken a deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioral guidelines, where we provide examples of how we got here, what we can do about it, why we got here, and how we can avoid these traps in the future. This is a unique viewpoint that has never been explored – the five battlefields include Economics, Technology, Information, Education, and Leadership – and how each has contributed to our current disadvantage on the global stage. We go on to discuss how Zero Trust can change the game to create an advantage for us going forward. The credibility of Zero Trust stems directly from the father of Zero Trust, John Kindervag, who says, "And now, Steve has written a new book on Zero Trust called Losing the Cybersecurity War: And What We Can Do to Stop It. It is undeniably the best Zero Trust book yet written. While other writers have focused on implementing Zero Trust from their perspectives, Steve focuses on why Zero Trust is so important on the modern cybersecurity battlefield. His concept of the five cyber battlefields is a great insight that will help us win the cyberwar. By weaving Zero Trust principles throughout these five concepts, Steve demonstrates how the ideas and efforts involved in building Zero Trust environments will lead to a profound shift in terrain advantage. No longer will attackers own the high ground. As defenders and protectors, we can leverage modern technology in a Zero Trust way to keep our data and assets safe from infiltration and exploitation."

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Losing the Cybersecurity War by Steve King, Kiren Chaudry, Kiren Chaudry in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2022
ISBN
9781000798197
Edition
1

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Contents
  6. Foreword
  7. Testimonials
  8. Preface
  9. Acknowledgements
  10. Introduction
  11. Chapter 1 ■ What Is Zero Trust?
  12. Chapter 2 ■ The Five Battlefields of Cybersecurity
  13. Chapter 3 ■ The Impact of the Last 20 Years
  14. Chapter 4 ■ The Connected World
  15. Chapter 5 ■ Cybersecurity Problems Are Hard Problems
  16. Chapter 6 ■ Advertising Our Vulnerabilities
  17. Chapter 7 ■ Why We Got Here
  18. Chapter 8 ■ The Institutionalization
  19. Chapter 9 ■ The End and the Beginning
  20. Epilogue